Loading HuntDB...

GHSA-86wm-rrjm-8wh8

GitHub Security Advisory

Buffer not correctly recycled in Gzip Request inflation

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Impact
If GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an
attacker can send a request with a body that is received entirely by not consumed by the application, then a subsequent request
on the same connection will see that body prepended to it's body.

The attacker will not see any data, but may inject data into the body of the subsequent request

CVE score is [4.8 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L&version=3.1)

### Workarounds
The problem can be worked around by either:
- Disabling compressed request body inflation by GzipHandler.
- By always fully consuming the request content before sending a response.
- By adding a `Connection: close` to any response where the servlet does not fully consume request content.

Affected Packages

Maven org.eclipse.jetty:jetty-server
Affected versions: 9.4.0 (fixed in 9.4.35.v20201120)

Related CVEs

Key Information

GHSA ID
GHSA-86wm-rrjm-8wh8
Published
December 2, 2020 6:28 PM
Last Modified
February 21, 2024 5:23 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.eclipse.jetty:jetty-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.